Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?

Which option best describes the limitation of a client that is attempting to manage a WLC while using the client wireless adapter connection to the wireless infrastructure?
A . Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet).
B . Read-write access is not available; only read-only access is supported.
C . Uploads and downloads from the controller are not allowed.
D . Wireless clients can manage other controllers, but not the same controller and the AP to which the client is associated.

Answer: C

Latest 200-355 Dumps Valid Version with 539 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments